• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Fu Ning, Zhou Xingshe, Zhan Tao. QPi: A Calculus to Enforce Trustworthiness Requirements[J]. Journal of Computer Research and Development, 2011, 48(11): 2120-2130.
Citation: Fu Ning, Zhou Xingshe, Zhan Tao. QPi: A Calculus to Enforce Trustworthiness Requirements[J]. Journal of Computer Research and Development, 2011, 48(11): 2120-2130.

QPi: A Calculus to Enforce Trustworthiness Requirements

More Information
  • Published Date: November 14, 2011
  • As service becomes the core concept for the abstraction and wrapping of diverse resources in open environment, a new software development paradigm which constructs applications based on services and service compositions becomes the mainstream technology and the direction of distributed computing. With the related researches and applications developing in depth, more and more people have realized that we must pay more attention to trustworthiness under the precondition of functional implementation when constructing service application in open, dynamic computing environment. Software theories and formal methods are regarded as the key for assuring the correctness and trustworthiness of software. Trustworthy computing requires the theories for modeling and analyzing business process in terms of both behavior and trustworthiness. A calculus for assuring satisfaction of trustworthiness requirements in service-oriented systems is proposed in this paper. We investigate a calculus called QPi, for representing both behavior and trustworthiness property of processes. QPi is the combination of Pi calculus and constraint semi-ring, which has a unique advantage when problems with multiple trustworthiness dimensions must be tackled. The notion of quantified bisimulation on process provides us a measure on the degree of equivalence of process based on bisimulation distance. QPi related properties of bisimulation and bisimilarity are also discussed. Demonstrative examples reveal the effectiveness of the calculus.
  • Related Articles

    [1]Wu Jinjin, Liu Quan, Chen Song, Yan Yan. Averaged Weighted Double Deep Q-Network[J]. Journal of Computer Research and Development, 2020, 57(3): 576-589. DOI: 10.7544/issn1000-1239.2020.20190159
    [2]Zhu Fei, Wu Wen, Liu Quan, Fu Yuchen. A Deep Q-Network Method Based on Upper Confidence Bound Experience Sampling[J]. Journal of Computer Research and Development, 2018, 55(8): 1694-1705. DOI: 10.7544/issn1000-1239.2018.20180148
    [3]Yang Yatao, Zhang Yaze, Li Zichen, Zhang Fengjuan, Liu Boya. RAKA: New Authenticated Key Agreement Protocol Based on Ring-LWE[J]. Journal of Computer Research and Development, 2017, 54(10): 2187-2192. DOI: 10.7544/issn1000-1239.2017.20170477
    [4]Chen Junyu, Zhou Gang, Nan Yu, Zeng Qi. Semi-Supervised Local Expansion Method for Overlapping Community Detection[J]. Journal of Computer Research and Development, 2016, 53(6): 1376-1388. DOI: 10.7544/issn1000-1239.2016.20148339
    [5]He Xianmang, Chen Yindong, Li Dong, Hao Yanni. Study on Semi-Homogenous Algorithm Based on Ring Generalization[J]. Journal of Computer Research and Development, 2015, 52(10): 2382-2394. DOI: 10.7544/issn1000-1239.2015.20150494
    [6]Yang Shilai, Yang Yahui, Shen Qingni, and Huang Haizhen. A Method of Intrusion Detection Based on Semi-Supervised GHSOM[J]. Journal of Computer Research and Development, 2013, 50(11): 2375-2382.
    [7]Li Yufeng, Huang Shengjun, and Zhou Zhihua. Regularized Semi-Supervised Multi-Label Learning[J]. Journal of Computer Research and Development, 2012, 49(6): 1272-1278.
    [8]Liu Tao, He Yanxiang, Xiong Qi. A Q-Learning Based Real-Time Mitigating Mechanism against LDoS Attack and Its Modeling and Simulation with CPN[J]. Journal of Computer Research and Development, 2011, 48(3): 432-439.
    [9]Chen Shaozhen, Wang Wenqiang, Peng Shujuan. Efficient AttributeBased Ring Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(12).
    [10]Yang Jian, Wang Jue, Zhong Ning. Laplacian Semi-Supervised Regression on a Manifold[J]. Journal of Computer Research and Development, 2007, 44(7): 1121-1127.

Catalog

    Article views (687) PDF downloads (410) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return